Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 332063 - <net-fs/samba-3.4.8 Multiple vulnerabilities (CVE-2010-{1635,1642})
Summary: <net-fs/samba-3.4.8 Multiple vulnerabilities (CVE-2010-{1635,1642})
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://git.samba.org/?p=samba.git;a=c...
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks: CVE-2010-2063
  Show dependency tree
 
Reported: 2010-08-10 14:58 UTC by Alex Legler (RETIRED)
Modified: 2012-06-24 13:05 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-10 14:58:32 UTC
CVE-2010-1635 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635):
  The chain_reply function in process.c in smbd in Samba before 3.4.8
  and 3.5.x before 3.5.2 allows remote attackers to cause a denial of
  service (NULL pointer dereference and process crash) via a Negotiate
  Protocol request with a certain 0x0003 field value followed by a
  Session Setup AndX request with a certain 0x8003 field value.
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-10 15:04:15 UTC
CVE-2010-1642 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642):
  The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in
  Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to
  trigger an out-of-bounds read, and cause a denial of service (process
  crash), via a \xff\xff security blob length in a Session Setup AndX
  request.

Comment 2 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-12 20:39:18 UTC
Arches, please test and mark stable:
=net-fs/samba-3.5.4
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Comment 3 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-12 20:41:59 UTC
(In reply to comment #2)
> Arches, please test and mark stable:
> =net-fs/samba-3.5.4
> Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
> 

Cancel that.

Arches, please test and mark stable:
=net-fs/samba-3.4.8
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Comment 4 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2010-08-13 04:05:17 UTC
x86 stable
Comment 5 Joe Jezak (RETIRED) gentoo-dev 2010-08-13 12:15:54 UTC
Marked ppc/ppc64 stable.
Comment 6 Markos Chandras (RETIRED) gentoo-dev 2010-08-13 23:00:14 UTC
amd64 done
Comment 7 Raúl Porcel (RETIRED) gentoo-dev 2010-08-14 14:32:31 UTC
alpha/arm/ia64/s390/sh/sparc stable
Comment 8 Jeroen Roovers (RETIRED) gentoo-dev 2010-08-16 00:55:04 UTC
Stable for HPPA.
Comment 9 Tim Sammut (RETIRED) gentoo-dev 2010-11-19 07:18:11 UTC
GLSA with 337295.
Comment 10 GLSAMaker/CVETool Bot gentoo-dev 2012-06-24 13:05:10 UTC
This issue was resolved and addressed in
 GLSA 201206-22 at http://security.gentoo.org/glsa/glsa-201206-22.xml
by GLSA coordinator Sean Amoss (ackle).